Computer Security -- ESORICS 2015 [electronic resource] : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I / edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl.
Contributor(s): Pernul, Günther [editor.] | Y A Ryan, Peter [editor.] | Weippl, Edgar [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 9326Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Edition: 1st ed. 2015.Description: XVIII, 543 p. 114 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319241746.Subject(s): Data protection | Cryptography | Data encryption (Computer science) | Electronic data processing -- Management | Algorithms | Computers and civilization | Data and Information Security | Cryptology | IT Operations | Algorithms | Computers and SocietyAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security. .The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security. .
There are no comments for this item.